US20080233920A1 - Method for producing authentication information - Google Patents

Method for producing authentication information Download PDF

Info

Publication number
US20080233920A1
US20080233920A1 US12/153,678 US15367808A US2008233920A1 US 20080233920 A1 US20080233920 A1 US 20080233920A1 US 15367808 A US15367808 A US 15367808A US 2008233920 A1 US2008233920 A1 US 2008233920A1
Authority
US
United States
Prior art keywords
security module
mobile station
key material
authentication information
authentication procedure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/153,678
Other versions
US8170531B2 (en
Inventor
Lauri Laitinen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Oyj
Original Assignee
Nokia Oyj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Oyj filed Critical Nokia Oyj
Priority to US12/153,678 priority Critical patent/US8170531B2/en
Publication of US20080233920A1 publication Critical patent/US20080233920A1/en
Application granted granted Critical
Publication of US8170531B2 publication Critical patent/US8170531B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • This invention relates to authentication protocols in communication systems, specifically to production of authentication information.
  • Authentication protocols of communication systems typically rely on key information stored in a security module, such as a SIM (subscriber identity module) card, in the mobile station, and in a specific network node such as an AuC (authentication center) node.
  • the key information can be a shared secret, or for example a private/public key pair.
  • authentication information is produced on the basis of the shared secret, and typically used in a challenge-response protocol to authenticate the mobile station to the network.
  • the generic authentication architecture is under standardization for 3GPP (third generation partnership project) system release 6 at the time of writing of this patent application.
  • the 3GPP standards specify certain authentication procedures which require certain capabilities of the security module of a mobile station.
  • GSM global system for mobile communications
  • GSM global system for mobile communications
  • Embodiments of the present invention aim to overcome one or several of the above problems.
  • a method in a mobile station of a communication system comprises at least the steps of
  • said authentication information is a shared secret.
  • the ability of a security module to produce authentication information for use in a predetermined authentication procedure can be determined for example by determining the type of said security module. The determination can also be performed for example by determining the type of information stored in the security module as the identity of the subscriber.
  • the method may further comprise the step of transmitting an indication of the result of the step of determining if a security module installed in the mobile station is able to produce authentication information.
  • a method in a network element of a communication system comprises at least the steps of
  • said authentication information is a shared secret.
  • the step of determining if a security module installed in the mobile station is able to produce authentication information comprises the step of receiving an indication from the mobile station.
  • a mobile station for a communication system having an interface for a security module.
  • the mobile station comprises at least
  • the means for determining can be configured to determine the type of said security module, or for example the type of information stored in the security module as the identity of the subscriber.
  • the mobile station may further comprise means for transmitting an indication of whether the security module installed in the mobile station is able to produce authentication information for use in the predetermined authentication procedure with the communication system.
  • a mobile station for a communication system having an interface for a security module.
  • the mobile station comprises at least
  • a controller configured to determine if a security module connected to the interface is able to produce authentication information for use in a predetermined authentication procedure with the communication system
  • a controller configured to cause key material to be generated by the security module and to receive generated first key material
  • a key material generator configured to generate authentication information based at least in part on the key material for use in the predetermined authentication procedure with the communication system.
  • an authentication system in a network element of a communication system.
  • the system comprises at least
  • an authentication system in a network element of a communication system.
  • the system comprises at least
  • a controller configured to determine if a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between the communication system and the mobile station,
  • a key generator configured to generate key material using a method which the security module is able to perform
  • a key generator configured to generate authentication information at least in part on the basis of the key material for use in the predetermined authentication procedure.
  • the network element comprises
  • the network element comprises
  • a controller configured to determine if a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between the communication system and the mobile station,
  • a key generator configured to generate key material using a method which the security module is able to perform
  • a key generator configured to generate authentication information at least in part on the basis of the key material for use in the predetermined authentication procedure.
  • FIG. 1 illustrates a mobile station and a communication system
  • FIG. 2 illustrates a signalling flow chart according to an embodiment.
  • FIG. 1 illustrates a mobile station 20 and a security module 10 installed in the mobile station.
  • FIG. 1 also illustrates a communication system 210 such as a cellular telecommunications network, a base station 212 of the communication system, a SANE 30 , and a security network element 40 .
  • the mobile station further comprises means 220 for determining if a security module connected to said interface is able to produce authentication information for use in a predetermined authentication procedure with the cellular network, means 222 for causing key material to be generated by said security module and for receiving generated first key material, and means 224 for generating authentication information based at least in part on said key material for use in said predetermined authentication procedure with the cellular network.
  • Said means 220 , 222 , and 224 can advantageously be implemented using software program code in a processor of the mobile station.
  • FIG. 1 also illustrates certain components of the security network element 40 .
  • the security network element further comprises means 230 for determining if a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between the network communication system and the mobile station, means 232 for generating key material using a method which said the security module is able to perform, and means 234 for generating authentication information at least in part on the basis of said the key material for use in said predetermined authentication procedure.
  • Said means 230 , 232 , and 234 can advantageously be implemented using software program code in a processor of the network element.
  • FIG. 2 shows signalling between and actions of a security module (SM) 10 , a mobile station (MS) 20 , an authentication network element (SANE) 30 , and a security network element (NE) 40 .
  • a security application network element (SANE) is a network element that communicates with the mobile station and the network element(s) responsible for storing key information of subscribers, performing a certain authentication protocol.
  • a MSC/VLR Mobile Switching Center/Visitor Location Register
  • SGSN Serving GPRS Support Node
  • BSF Bootstrapping Function
  • the security network element 40 is an element which performs preparation of key material according to the invention.
  • the security network element can comprise a database or other memory means holding key information of subscribers.
  • the security network element can also be implemented external to such a database or other memory means, in which case the security network element can query key information from such a database or other memory means.
  • a database can be for example a home location register (HLR) of a GSM system, or a home subscriber server (HSS) of a third generation cellular telecommunication system.
  • the mobile station first determines 110 the capabilities of the security module (SM), for example by determining the type of the security module and inferring the capabilities of the security module from its type. Further methods for performing this determination of capabilities of the security module are discussed later in this specification.
  • the mobile station begins an authentication procedure by sending 115 an authentication request to the SANE 30 .
  • the mobile station can include an indication of the capabilities of the security module in the authentication request.
  • the SANE 30 sends 120 an authentication information request to the security network element 40 .
  • the security network element determines 125 the capabilities of the security module of the mobile station. In such an embodiment of the invention in which the mobile station included an indication of the capabilities of the security module, this determination can be as simple as observing the indication. Further examples of possible methods for determination of the capabilities of the security module are presented later in this application.
  • the security network element first prepares 130 key material using a method supported by the security module of the mobile station.
  • the security network element uses key information such as a shared secret known both by the security module of the mobile station and the network, obtained from a database of subscriber security information.
  • the security network element prepares 132 authentication information at least in part on the basis of the key material prepared in step 130 .
  • the authentication information can be for example in the form of a shared secret suitable for use in the authentication procedure executed by the SANE, i.e. used as a temporary shared secret in the authentication procedure.
  • the security network element sends 135 the generated authentication information in an authentication information request answer message 135 to the SANE. Based on this authentication information, the SANE transmits 140 a challenge to the mobile station 20 .
  • the mobile station causes the security module to calculate key material in step 142 . Based on the calculated key material the mobile station calculates authentication information using a method corresponding to the method used by the network security element, and uses this authentication information to calculate 145 a response to the challenge as required by the authentication procedure. Next, the mobile station transmits 150 the response to SANE, which then checks 155 that the response matches the transmitted challenge according to the authentication protocol in use.
  • FIG. 2 represents only a particular example of communication according to the invention, and the signalling can be different in implementations using different types of authentication procedures.
  • the method steps can also be implemented using software executed on a processor.
  • an embodiment can be implemented by software, which when executed on a processor of a mobile station causes the mobile station to carry out the steps of an embodiment.
  • a further embodiment can be implemented by software, which when executed on a processor of a network element of a communication system causes the network element to carry out the steps of an embodiment.
  • Appropriately adapted computer program code product may be used for implementing the embodiments, when loaded to a processor.
  • the program code product for providing the method steps may be stored on and provided by means of a carrier medium such as a carrier disc, card or tape. A possibility is to download the program code product via a data network.
  • the inventive functionalities are implemented in the MS and the security network element.
  • the SANE need not be modified to work with the invention, nor does it need to be aware of the situation that the security module does not support the authentication procedures performed by the SANE.
  • a mobile station can be adapted to use different types of security elements, and can be programmed to perform new authentication protocols.
  • an old GSM SIM card can be used in a 3 G mobile station, and the invention allows the use of the SIM card with authentication protocols that were not envisioned at the time when the SIM card was developed.
  • the determination of which key generation methods a security module of a mobile station supports can be performed in many different ways.
  • the determination can be made with explicit querying and signalling: the network can send a query to the mobile station, which reports the capabilities of the security module back to the network.
  • the implementation of any such negotiation naturally depends on the particular authentication protocol in use in a network, and what kinds of negotiation extensions, if any, the protocol allows.
  • the determination of which key generation methods a security module of a mobile station supports can be implemented by detecting the type of the security module, and determining the capabilities of the security module based on the type.
  • the security module types which at the time of writing of this patent application can be used in mobile stations according to 3GPP standards are the SIM, USIM, and ISIM.
  • the SIM is capable of performing key generation according to so called 2 G (second generation) GSM standards
  • USIM and ISIM type of security modules can perform 3 G key generation.
  • the type of identity information stored in the security module can be used to perform the determination of which key generation methods a security module of a mobile station supports.
  • the type of the security module and therefore the capabilities of the security modules can be inferred from whether the security module has an IMSI (International mobile subscriber identity) or an IMPI (IPMultimedia Private Identity) stored as the identity of the subscriber.
  • IMSI International mobile subscriber identity
  • IMPI IP Multimedia Private Identity
  • the capabilities of the security module are inferred from the detected type of the security module, where the type detection is made on the basis more than one piece of information stored in the security module.
  • the capabilities of the security module can also determined by obtaining information regarding the capabilities from a database in the communication system.
  • the security network element can have a predefined ordered list of possible authentication information generation methods, which are tried in order, until an authentication with the security module of the mobile station succeeds.
  • the network security element can also have a plurality of such lists, from which one can be selected for use on the basis of a parameter, such as location of the mobile station, or known attributes of the security module.
  • a pseudo-shared secret for use in place of a true shared secret can be generated based on other shared data, i.e. data that is known by both the mobile station and the network. This pseudo-shared secret can then be used to generate key information for use in authentication.
  • shared data can be for example setting flags and control information stored in the terminal side that is known also by an operator. In general, any data that is set to the mobile station in configuration procedures and is not sent over the air interface in normal communication can be used as such shared data.
  • This shared data can also be user specific shared data stored in a user specific subscriber module or terminal specific shared data based on used ME's properties (e.g. IMEI).
  • the invention has several advantages.
  • One of the advantages is that the invention allows the use of older security modules already in use by large numbers of subscribers in networks which use authentication procedures not supported by these older security modules.
  • the invention also allows the use of the same authentication procedure regardless of whether the security module of a mobile station supports the procedure or not.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method in a mobile station for a communication system includes determining if a security module installed in a mobile station is able to produce authentication information for use in a predetermined authentication procedure with a communication system. If not, the method includes generating key material using the security module, and generating the authentication information based on at least the key material for use in the predetermined authentication procedure with the communication system.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • The present application is a continuation of U.S. patent application Ser. No. 11/146,052, which was filed on Jun. 7, 2005. Priority of this application is claimed, and the entire contents of which is hereby incorporated by reference.
  • FIELD OF INVENTION
  • This invention relates to authentication protocols in communication systems, specifically to production of authentication information.
  • TECHNOLOGICAL BACKGROUND
  • Authentication protocols of communication systems typically rely on key information stored in a security module, such as a SIM (subscriber identity module) card, in the mobile station, and in a specific network node such as an AuC (authentication center) node. The key information can be a shared secret, or for example a private/public key pair. In systems where a shared secret is used, authentication information is produced on the basis of the shared secret, and typically used in a challenge-response protocol to authenticate the mobile station to the network.
  • The continuing development of cellular telecommunication systems brings about developments in the authentication procedures used between a mobile station and the network. This inevitably results in interoperation problems with a widely used base of older equipment and new systems.
  • The generic authentication architecture (GAA) is under standardization for 3GPP (third generation partnership project) system release 6 at the time of writing of this patent application. The 3GPP standards specify certain authentication procedures which require certain capabilities of the security module of a mobile station. However, there is a wide installed base of GSM (global system for mobile communications) technology with large numbers of subscribers, resulting in the problem of how to use older GSM SIM cards in conjunction with the newest authentication procedures, as the SIM cards are unable to provide key material as required by these newest authentication procedures. The inventor envisions that similar problems may arise also later, when a further generation of technology is developed to replace the third generation (3 G) technology currently in development.
  • SUMMARY OF THE INVENTION
  • Embodiments of the present invention aim to overcome one or several of the above problems.
  • According to an embodiment, a method in a mobile station of a communication system is provided. The method comprises at least the steps of
  • determining if a security module installed in the mobile station is able to produce authentication information for use in a predetermined authentication procedure with the communication system, and if not,
  • generating key material using the security module, and
  • generating authentication information based at least in part on the key material for use in the predetermined authentication procedure with the communication system.
  • According to a more specific embodiment, said authentication information is a shared secret.
  • The ability of a security module to produce authentication information for use in a predetermined authentication procedure can be determined for example by determining the type of said security module. The determination can also be performed for example by determining the type of information stored in the security module as the identity of the subscriber.
  • The method may further comprise the step of transmitting an indication of the result of the step of determining if a security module installed in the mobile station is able to produce authentication information.
  • According to another embodiment of the invention, a method in a network element of a communication system is provided. According to this embodiment, the method comprises at least the steps of
  • determining if the security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between the communication system and the mobile station, and if not,
  • generating key material using a method which the security module is able to perform, and
  • generating authentication information at least in part on the basis of the key material for use in the predetermined authentication procedure.
  • According to a more specific embodiment, said authentication information is a shared secret.
  • Further, the step of determining if a security module installed in the mobile station is able to produce authentication information comprises the step of receiving an indication from the mobile station.
  • According to another embodiment, there is provided a mobile station for a communication system, the mobile station having an interface for a security module. According to this embodiment, the mobile station comprises at least
  • means for determining if a security module connected to said interface is able to produce authentication information for use in a predetermined authentication procedure with the communication system,
  • means for causing key material to be generated by the security module and for receiving generated first key material,
  • means for generating authentication information based at least in part on the key material for use in the predetermined authentication procedure with the communication system.
  • The means for determining can be configured to determine the type of said security module, or for example the type of information stored in the security module as the identity of the subscriber.
  • The mobile station may further comprise means for transmitting an indication of whether the security module installed in the mobile station is able to produce authentication information for use in the predetermined authentication procedure with the communication system.
  • According to a further embodiment, there is provided a mobile station for a communication system, the mobile station having an interface for a security module. According to this embodiment, the mobile station comprises at least
  • a controller configured to determine if a security module connected to the interface is able to produce authentication information for use in a predetermined authentication procedure with the communication system,
  • a controller configured to cause key material to be generated by the security module and to receive generated first key material,
  • a key material generator configured to generate authentication information based at least in part on the key material for use in the predetermined authentication procedure with the communication system.
  • According to a further embodiment, there is provided an authentication system in a network element of a communication system. According to this embodiment, the system comprises at least
  • means for determining if a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between the communication system and the mobile station,
  • means for generating key material using a method which the security module is able to perform, and
  • means for generating authentication information at least in part on the basis of the key material for use in said predetermined authentication procedure.
  • According to a still further embodiment, there is provided an authentication system in a network element of a communication system. According to the this embodiment, the system comprises at least
  • a controller configured to determine if a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between the communication system and the mobile station,
  • a key generator configured to generate key material using a method which the security module is able to perform, and
  • a key generator configured to generate authentication information at least in part on the basis of the key material for use in the predetermined authentication procedure.
  • According to another embodiment, there is provided a network element of a communication system. According to the this embodiment, the network element comprises
  • means for determining if a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between the communication system and the mobile station,
  • means for generating key material using a method which the security module is able to perform, and
  • means for generating authentication information at least in part on the basis of the key material for use in said predetermined authentication procedure.
  • According to another embodiment, there is provided a network element of a communication system. According to the this embodiment, the network element comprises
  • a controller configured to determine if a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between the communication system and the mobile station,
  • a key generator configured to generate key material using a method which the security module is able to perform, and
  • a key generator configured to generate authentication information at least in part on the basis of the key material for use in the predetermined authentication procedure.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Embodiments of the present invention will now be described by way of example with reference to the accompanying drawings, in which:
  • FIG. 1 illustrates a mobile station and a communication system, and
  • FIG. 2 illustrates a signalling flow chart according to an embodiment.
  • DETAILED DESCRIPTION OF EMBODIMENTS
  • FIG. 1 illustrates a mobile station 20 and a security module 10 installed in the mobile station. FIG. 1 also illustrates a communication system 210 such as a cellular telecommunications network, a base station 212 of the communication system, a SANE 30, and a security network element 40.
  • The mobile station further comprises means 220 for determining if a security module connected to said interface is able to produce authentication information for use in a predetermined authentication procedure with the cellular network, means 222 for causing key material to be generated by said security module and for receiving generated first key material, and means 224 for generating authentication information based at least in part on said key material for use in said predetermined authentication procedure with the cellular network.
  • Said means 220, 222, and 224 can advantageously be implemented using software program code in a processor of the mobile station.
  • FIG. 1 also illustrates certain components of the security network element 40. The security network element further comprises means 230 for determining if a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between the network communication system and the mobile station, means 232 for generating key material using a method which said the security module is able to perform, and means 234 for generating authentication information at least in part on the basis of said the key material for use in said predetermined authentication procedure. Said means 230, 232, and 234 can advantageously be implemented using software program code in a processor of the network element.
  • FIG. 2 shows signalling between and actions of a security module (SM) 10, a mobile station (MS) 20, an authentication network element (SANE) 30, and a security network element (NE) 40. A security application network element (SANE) is a network element that communicates with the mobile station and the network element(s) responsible for storing key information of subscribers, performing a certain authentication protocol. For example, a MSC/VLR (Mobile Switching Center/Visitor Location Register) or a SGSN (Serving GPRS Support Node) can be used as a SANE. For example, in the GAA architecture (general authentication architecture) the Bootstrapping Function (BSF) can be used as a SANE. The security network element 40 (NE) is an element which performs preparation of key material according to the invention. The security network element can comprise a database or other memory means holding key information of subscribers. The security network element can also be implemented external to such a database or other memory means, in which case the security network element can query key information from such a database or other memory means. Such a database can be for example a home location register (HLR) of a GSM system, or a home subscriber server (HSS) of a third generation cellular telecommunication system.
  • According to FIG. 2, the mobile station (MS) first determines 110 the capabilities of the security module (SM), for example by determining the type of the security module and inferring the capabilities of the security module from its type. Further methods for performing this determination of capabilities of the security module are discussed later in this specification. The mobile station begins an authentication procedure by sending 115 an authentication request to the SANE 30. The mobile station can include an indication of the capabilities of the security module in the authentication request. The SANE 30 sends 120 an authentication information request to the security network element 40. The security network element determines 125 the capabilities of the security module of the mobile station. In such an embodiment of the invention in which the mobile station included an indication of the capabilities of the security module, this determination can be as simple as observing the indication. Further examples of possible methods for determination of the capabilities of the security module are presented later in this application.
  • In the case that the security module cannot produce authentication information for use in the authentication protocol, the security network element first prepares 130 key material using a method supported by the security module of the mobile station. In this preparation, the security network element uses key information such as a shared secret known both by the security module of the mobile station and the network, obtained from a database of subscriber security information. The security network element prepares 132 authentication information at least in part on the basis of the key material prepared in step 130. The authentication information can be for example in the form of a shared secret suitable for use in the authentication procedure executed by the SANE, i.e. used as a temporary shared secret in the authentication procedure.
  • Next, the security network element sends 135 the generated authentication information in an authentication information request answer message 135 to the SANE. Based on this authentication information, the SANE transmits 140 a challenge to the mobile station 20.
  • The mobile station causes the security module to calculate key material in step 142. Based on the calculated key material the mobile station calculates authentication information using a method corresponding to the method used by the network security element, and uses this authentication information to calculate 145 a response to the challenge as required by the authentication procedure. Next, the mobile station transmits 150 the response to SANE, which then checks 155 that the response matches the transmitted challenge according to the authentication protocol in use.
  • It is to be understood that FIG. 2 represents only a particular example of communication according to the invention, and the signalling can be different in implementations using different types of authentication procedures.
  • The method steps can also be implemented using software executed on a processor. For example, an embodiment can be implemented by software, which when executed on a processor of a mobile station causes the mobile station to carry out the steps of an embodiment. For example, a further embodiment can be implemented by software, which when executed on a processor of a network element of a communication system causes the network element to carry out the steps of an embodiment. Appropriately adapted computer program code product may be used for implementing the embodiments, when loaded to a processor. The program code product for providing the method steps may be stored on and provided by means of a carrier medium such as a carrier disc, card or tape. A possibility is to download the program code product via a data network.
  • In a further embodiment of the invention, the inventive functionalities are implemented in the MS and the security network element. In such an embodiment, the SANE need not be modified to work with the invention, nor does it need to be aware of the situation that the security module does not support the authentication procedures performed by the SANE. A mobile station can be adapted to use different types of security elements, and can be programmed to perform new authentication protocols. For example, an old GSM SIM card can be used in a 3 G mobile station, and the invention allows the use of the SIM card with authentication protocols that were not envisioned at the time when the SIM card was developed.
  • The determination of which key generation methods a security module of a mobile station supports can be performed in many different ways. In a further embodiment of the invention, the determination can be made with explicit querying and signalling: the network can send a query to the mobile station, which reports the capabilities of the security module back to the network. The implementation of any such negotiation naturally depends on the particular authentication protocol in use in a network, and what kinds of negotiation extensions, if any, the protocol allows.
  • In a further embodiment, the determination of which key generation methods a security module of a mobile station supports can be implemented by detecting the type of the security module, and determining the capabilities of the security module based on the type. For example, the security module types which at the time of writing of this patent application can be used in mobile stations according to 3GPP standards are the SIM, USIM, and ISIM. Of these, the SIM is capable of performing key generation according to so called 2 G (second generation) GSM standards, while USIM and ISIM type of security modules can perform 3 G key generation.
  • In a further embodiment of the invention, the type of identity information stored in the security module can be used to perform the determination of which key generation methods a security module of a mobile station supports. For example, the type of the security module and therefore the capabilities of the security modules can be inferred from whether the security module has an IMSI (International mobile subscriber identity) or an IMPI (IPMultimedia Private Identity) stored as the identity of the subscriber.
  • In a further embodiment, the capabilities of the security module are inferred from the detected type of the security module, where the type detection is made on the basis more than one piece of information stored in the security module.
  • The capabilities of the security module can also determined by obtaining information regarding the capabilities from a database in the communication system.
  • In a further embodiment, the security network element can have a predefined ordered list of possible authentication information generation methods, which are tried in order, until an authentication with the security module of the mobile station succeeds. The network security element can also have a plurality of such lists, from which one can be selected for use on the basis of a parameter, such as location of the mobile station, or known attributes of the security module.
  • In cases where a true shared secret is not available, a pseudo-shared secret for use in place of a true shared secret can be generated based on other shared data, i.e. data that is known by both the mobile station and the network. This pseudo-shared secret can then be used to generate key information for use in authentication. Such shared data can be for example setting flags and control information stored in the terminal side that is known also by an operator. In general, any data that is set to the mobile station in configuration procedures and is not sent over the air interface in normal communication can be used as such shared data. This shared data can also be user specific shared data stored in a user specific subscriber module or terminal specific shared data based on used ME's properties (e.g. IMEI).
  • The invention has several advantages. One of the advantages is that the invention allows the use of older security modules already in use by large numbers of subscribers in networks which use authentication procedures not supported by these older security modules. The invention also allows the use of the same authentication procedure regardless of whether the security module of a mobile station supports the procedure or not.
  • It is noted that while the preceding description illustrates various embodiments of the invention within a 3 G cellular telecommunications system, the invention is not limited to a so called 3 G cellular system, but can be implemented in different types of cellular telecommunication systems as well.
  • It is also noted herein that while the above describes exemplifying embodiments of the invention, there are several variations and modifications which may be made to the disclosed solution without departing from the scope of the present invention as defined in the appended claims.

Claims (44)

1. A method, comprising:
determining in a mobile station for a communication system, whether a security module installed in the mobile station is able to produce authentication information for use in a predetermined authentication procedure with a communication system using key material as required by the predetermined authentication procedure, and
when the security module installed in the mobile station is not able to produce such authentication information,
generating, in the mobile station, key material using a key generation method the security module does support, and
generating, in the mobile station, the authentication information based on at least said generated key material for use in said predetermined authentication procedure with the communication system.
2. A method according to claim 1, wherein the authentication information comprises a shared secret.
3. A method according to claim 1, wherein the determining comprises determining a type of said security module.
4. A method according to claim 1, wherein the determining comprises determining a type of information stored in the security module as an identity of a subscriber.
5. A method according to claim 1, further comprising:
transmitting an indication of a result of the determining.
6. A method, comprising:
determining in a network element of a communication system, whether a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between a communication system and the mobile station using key material as required by the predetermined authentication procedure, and
when the security module of the mobile station is not able to produce such authentication information,
generating, in said network element, key material using a method that said security module is able to perform, and
generating, in said network element, the authentication information based on at least the generated key material for use in said predetermined authentication procedure.
7. A method according to claim 6, wherein the authentication information comprises a shared secret.
8. A method according to claim 6, wherein the determining comprises determining a type of said security module.
9. A method according to claim 6, wherein the determining comprises determining a type of information stored in the security module as an identity of a subscriber.
10. A method according to claim 6, wherein the determining comprises receiving an indication from said mobile station.
11. An apparatus, comprising:
determining means for determining whether a security module connected to an interface of a mobile station is able to produce authentication information for use in a predetermined authentication procedure with a communication system using key material as required by the predetermined authentication procedure,
causing means for causing key material to be generated by the security module using a key generation method the security module does support, when the security module is not able to produce such authentication information, and for receiving generated first key material, and
generating means for generating the authentication information based on at least the generated key material for use in said predetermined authentication procedure with the communication system.
12. The apparatus of claim 11, wherein the generating means is configured to generate a shared secret.
13. The apparatus of claim 11, wherein the determining means is configured to determine a type of the security module.
14. The apparatus of claim 11, wherein the determining means is configured to determine a type of information stored in said security module as an identity of a subscriber.
15. The apparatus of claim 11, further comprising:
transmitting means for transmitting an indication of whether the security module installed in the mobile station is able to produce the authentication information for use in the predetermined authentication procedure with the communication system.
16. An apparatus, comprising:
a first controller configured to determine whether a security module connected to an interface of a mobile station is able to produce authentication information for use in a predetermined authentication procedure with a communication system using key material as required by the predetermined authentication procedure,
a second controller configured to cause key material to be generated by the security module using a key generation method the security module does support, when the security module is not able to produce such authentication information, and to receive generated first key material,
a key material generator configured to generate the authentication information based on at least said generated key material for use in the predetermined authentication procedure with the communication system.
17. The apparatus of claim 16, wherein the key material generator is configured to generate a shared secret.
18. The apparatus of claim 16, wherein the first controller is configured to determine a type of the security module.
19. The apparatus of claim 16, wherein the first controller is configured to determine a type of information stored in the security module as an identity of a subscriber.
20. The apparatus of claim 16, further comprising:
a transmitter configured to transmit an indication of whether the security module installed in the mobile station is able to produce the authentication information for use in the predetermined authentication procedure with the communication system.
21. An authentication system in a network element, comprising:
determining means for determining whether a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between a communication system and the mobile station using key material as required by the predetermined authentication procedure,
first generating means for generating key material using a method which the security module is able to perform when the security module is not able to produce such authentication information, and
second generating means for generating the authentication information based on at least the generated key material for use in said predetermined authentication procedure.
22. An authentication system according to claim 21, wherein the second generating means is configured to generate a shared secret.
23. An authentication system according to claim 21, wherein the determining means is configured to determine a type of the security module.
24. An authentication system according to claim 21, wherein the determining means is configured to determine a type of information stored in the security module as an identity of a subscriber.
25. An authentication system according to claim 21, wherein the determining means is configured to receive an indication from the mobile station.
26. An authentication system in a network element, comprising:
a controller configured to determine whether a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between a communication system and the mobile station using key material as required by the predetermined authentication procedure,
a first key generator configured to generate key material using a method that the security module is able to perform when the security module is not able to produce such authentication information, and
a second key generator configured to generate the authentication information based on at least said generated key material for use in said predetermined authentication procedure.
27. An authentication system according to claim 26, wherein the second key generator is configured to generate a shared secret.
28. An authentication system according to claim 26, wherein the controller is configured to determine a type of the security module.
29. An authentication system according to claim 26, wherein the controller is configured to determine a type of information stored in the security module as an identity of a subscriber.
30. An authentication system according to claim 26, wherein the controller is configured to receive an indication from the mobile station.
31. An apparatus, comprising:
determining means for determining whether a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between a communication system and the mobile station using key material as required by the predetermined authentication procedure,
first generating means for generating key material using a method that the security module is able to perform when the security module is not able to produce such authentication information, and
second generating means for generating the authentication information based on at least the generated key material for use in said predetermined authentication procedure.
32. The apparatus of claim 31, wherein the second generating means is configured to generate a shared secret.
33. The apparatus of claim 31, wherein the determining means is configured to determine a type of the security module.
34. The apparatus of claim 31, wherein the determining means is configured to determine a type of information stored in the security module as an identity of a subscriber.
35. The apparatus of claim 31, wherein the determining means is configured to receive an indication from the mobile station.
36. An apparatus, comprising:
a controller configured to determine whether a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between the communication system and the mobile station using key material as required by the predetermined authentication procedure,
a first key generator configured to generate key material using a method that the security module is able to perform when the security module is not able to produce such authentication information, and
a second key generator configured to generate the authentication information based on at least said generated key material for use in said predetermined authentication procedure.
37. The apparatus of claim 36, wherein the second key generator is configured to generate a shared secret.
38. The apparatus of claim 36, wherein the controller is configured to determine a type of the security module.
39. The apparatus of claim 36, wherein the controller is configured to determine a type of information stored in the security module as an identity of a subscriber.
40. The apparatus of claim 36, wherein the controller is configured to receive an indication from the mobile station.
41. A computer program embodied on a computer-readable medium, the computer program configured to control a processor to perform:
determining whether a security module installed in a mobile station is able to produce authentication information for use in predetermined authentication information for use in predetermined authentication procedure with a communication system using key material as required by the predetermined authentication procedure, and
when the security module installed in the mobile station is not able to produce such authentication information,
generating key material using a key generation method the security module does support, and
generating the authentication information based on at least said generated key material for use in said predetermined authentication procedure with the communication system.
42. A computer program embodied on a computer-readable medium, the computer program configured to control a processor to perform:
determining whether a security module of a mobile station is able to produce authentication information for use in a predetermined authentication procedure to be performed between a communication system and the mobile station using key material as required by the predetermined authentication procedure, and
when the security module of the mobile station is not able to produce such authentication information,
generating key material using a method that said security module is able to perform, and
generating the authentication information based on at least the generated key material for use in said predetermined authentication procedure.
43. A method according to claim 1, wherein the generating is generating key material using the security module.
44. A computer program according to claim 41, wherein the generating is generating key material using the security module.
US12/153,678 2004-12-22 2008-05-22 Method for producing authentication information Active 2028-02-12 US8170531B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/153,678 US8170531B2 (en) 2004-12-22 2008-05-22 Method for producing authentication information

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
EP2004028084 2004-12-22
EP0428084 2004-12-22
GB042808.4 2004-12-22
EP0428084.8 2004-12-22
GBGB0428084.8A GB0428084D0 (en) 2004-12-22 2004-12-22 Method for producing authentication information
US11/146,052 US7502607B2 (en) 2004-12-22 2005-06-07 Method for producing authentication information
US12/153,678 US8170531B2 (en) 2004-12-22 2008-05-22 Method for producing authentication information

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/146,052 Continuation US7502607B2 (en) 2004-12-22 2005-06-07 Method for producing authentication information

Publications (2)

Publication Number Publication Date
US20080233920A1 true US20080233920A1 (en) 2008-09-25
US8170531B2 US8170531B2 (en) 2012-05-01

Family

ID=34113052

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/146,052 Active 2027-01-03 US7502607B2 (en) 2004-12-22 2005-06-07 Method for producing authentication information
US12/153,678 Active 2028-02-12 US8170531B2 (en) 2004-12-22 2008-05-22 Method for producing authentication information

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/146,052 Active 2027-01-03 US7502607B2 (en) 2004-12-22 2005-06-07 Method for producing authentication information

Country Status (8)

Country Link
US (2) US7502607B2 (en)
EP (1) EP1829406B1 (en)
JP (1) JP4824746B2 (en)
KR (1) KR100986537B1 (en)
CN (2) CN104811936B (en)
AU (1) AU2005317777B2 (en)
GB (1) GB0428084D0 (en)
WO (1) WO2006067561A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100185857A1 (en) * 2009-01-21 2010-07-22 Lee Allen Neitzel Removable security modules and related methods
US20110084800A1 (en) * 2009-10-14 2011-04-14 Lee-Chun Ko Access Authorization Method And Apparatus For A Wireless Sensor Network

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100575767B1 (en) * 2004-03-05 2006-05-03 엘지전자 주식회사 International mobile equipment identity number input method for mobile station
PL1954718T3 (en) * 2005-11-30 2015-04-30 Abbvie Inc Anti-a globulomer antibodies, antigen-binding moieties thereof, corresponding hybridomas, nucleic acids, vectors, host cells, methods of producing said antibodies, compositions comprising said antibodies, uses of said antibodies and methods of using said antibodies
KR101009330B1 (en) * 2006-01-24 2011-01-18 후아웨이 테크놀러지 컴퍼니 리미티드 Method, system and authentication centre for authenticating in end-to-end communications based on a mobile network
US7801510B2 (en) * 2006-02-27 2010-09-21 Samsung Electronics Co., Ltd Authentication method in a mobile broadcast system and system thereof
EP2209329B1 (en) * 2009-01-15 2012-03-14 NTT DoCoMo, Inc. Method and apparatus for managing mobile device parameters
CN104640104A (en) * 2009-03-05 2015-05-20 交互数字专利控股公司 Method of WTRU for establishing network connection and WTRU
EP2315149B1 (en) * 2009-10-26 2019-11-20 Alcatel Lucent System and method for accessing private digital content
CN102804826B (en) * 2010-03-17 2016-03-02 瑞典爱立信有限公司 For the enhancing key management of SRNS reorientation
US8903367B2 (en) * 2010-05-20 2014-12-02 Qualcomm Incorporated Methods and apparatus for enabling backward compatibility in open market handsets
CN106707978B (en) * 2015-11-13 2021-10-22 北京奇虎科技有限公司 Method for transferring intelligent household control right through address book and address book
CN107395344A (en) * 2017-07-18 2017-11-24 北京深思数盾科技股份有限公司 User profile guard method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030221104A1 (en) * 2002-05-24 2003-11-27 Swisscom Mobile Ag Cryptographic security method and electronic devices suitable therefor
US20050020315A1 (en) * 2003-07-22 2005-01-27 Robertson Ian M. Security for mobile communications device

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9416595D0 (en) * 1994-08-17 1994-10-12 British Telecomm User authentication in a communications network
US6584310B1 (en) * 1998-05-07 2003-06-24 Lucent Technologies Inc. Method and apparatus for performing authentication in communication systems
GB2366938B (en) * 2000-08-03 2004-09-01 Orange Personal Comm Serv Ltd Authentication in a mobile communications network
US6882839B2 (en) 2001-05-08 2005-04-19 Lucent Technologies Inc. One-way roaming from ANS-41 to GSM systems
EP1343342B1 (en) 2002-03-08 2006-11-29 Sony Ericsson Mobile Communications AB Security protection for data communication
CN1219407C (en) * 2002-07-26 2005-09-14 华为技术有限公司 Method of wireless link encrypting aglorithm for autonomous selective secret communication
US20060288407A1 (en) * 2002-10-07 2006-12-21 Mats Naslund Security and privacy enhancements for security devices
ITRM20030100A1 (en) * 2003-03-06 2004-09-07 Telecom Italia Mobile Spa TECHNIQUE OF MULTIPLE ACCESS TO THE NETWORK BY USER TERMINAL INTERCONNECTED TO A LAN AND RELATED REFERENCE ARCHITECTURE.
CN1268157C (en) * 2003-12-12 2006-08-02 华中科技大学 A handset used for dynamic identity authentication
KR20070039692A (en) * 2005-10-10 2007-04-13 주식회사 팬택 Mobile communication terminal capable of providing song - making, accompaniment and recording function

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030221104A1 (en) * 2002-05-24 2003-11-27 Swisscom Mobile Ag Cryptographic security method and electronic devices suitable therefor
US20050020315A1 (en) * 2003-07-22 2005-01-27 Robertson Ian M. Security for mobile communications device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100185857A1 (en) * 2009-01-21 2010-07-22 Lee Allen Neitzel Removable security modules and related methods
GB2467421A (en) * 2009-01-21 2010-08-04 Fisher Rosemount Systems Inc Authentication of process control device using removable security module
GB2467421B (en) * 2009-01-21 2014-03-26 Fisher Rosemount Systems Inc Removable security modules and related methods
US8977851B2 (en) 2009-01-21 2015-03-10 Fisher-Rosemount Systems, Inc. Removable security modules and related methods
US20110084800A1 (en) * 2009-10-14 2011-04-14 Lee-Chun Ko Access Authorization Method And Apparatus For A Wireless Sensor Network
US8461963B2 (en) * 2009-10-14 2013-06-11 Industrial Technology Research Institute Access authorization method and apparatus for a wireless sensor network

Also Published As

Publication number Publication date
CN104811936A (en) 2015-07-29
EP1829406A1 (en) 2007-09-05
US7502607B2 (en) 2009-03-10
JP2008535292A (en) 2008-08-28
KR100986537B1 (en) 2010-10-07
AU2005317777A1 (en) 2006-06-29
AU2005317777B2 (en) 2009-11-19
KR20070108364A (en) 2007-11-09
EP1829406B1 (en) 2021-07-28
CN104811936B (en) 2019-05-03
CN101084694B (en) 2015-07-01
US8170531B2 (en) 2012-05-01
CN101084694A (en) 2007-12-05
JP4824746B2 (en) 2011-11-30
GB0428084D0 (en) 2005-01-26
WO2006067561A1 (en) 2006-06-29
US20060135125A1 (en) 2006-06-22

Similar Documents

Publication Publication Date Title
US8170531B2 (en) Method for producing authentication information
US8407769B2 (en) Methods and apparatus for wireless device registration
EP2548390B1 (en) Facilitating authentication of access terminal identity
US20090217038A1 (en) Methods and Apparatus for Locating a Device Registration Server in a Wireless Network
US9065641B2 (en) Method and device for updating a key
CN112219415B (en) User authentication in a first network using a subscriber identity module for a second old network
EP2533485B1 (en) Methods and devices for OTA management of subscriber identify modules
ES2562527T3 (en) Method and system for user equipment configuration
US10397001B2 (en) Secure mechanism for subsidy lock enforcement
CN102318386A (en) Service-based authentication to a network
US8874170B2 (en) Chip card, an electronic system, a method being implemented by a chip card and a computer program product
EP1424868B1 (en) Method, apparatus and system for handling an authentication error of a mobile user roaming between a GSM and a WLAN network
CN104254057A (en) Short message transmission method, system and equipment
KR100989271B1 (en) Apparatus and method for providing intelligent network service
CN117413554A (en) Key management method, device, equipment and storage medium

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12